Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation

Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation

Authors

  • Mohd Nizam Osman Universiti Teknologi MARA, Perlis Branch, Arau Campus
  • Khairul Anwar Sedek Universiti Teknologi MARA, Perlis Branch, Arau Campus
  • Nor Arzami Othman Universiti Teknologi MARA, Perlis Branch, Arau Campus
  • Muhammad Afiqhakimi Rosli Universiti Teknologi MARA, Perlis Branch, Arau Campus
  • Mushahadah Maghribi Politeknik Tuanku Syed Sirajuddin, Perlis

DOI:

https://doi.org/10.24191/jcrinn.v6i2.190

Keywords:

TOR, VPN, LAN, Encryption, Access Point, Raspberry PI

Abstract

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 

Downloads

Download data is not yet available.

References

Bian, J., Cao, C., Wang, L., Ye, J., Zhao, Y., & Tang, C. (2021). Tor Hidden Services Discovery and Analysis: A Literature Survey. Journal of Physics: Conference Series, 1757(1), 1-6.

Islam, Md. M., Rahaman, A., & Islam, Md. R. (2020). Development of Smart Healthcare Monitoring System in IoT Environment. SN Computer Science, 1(3), 185.

Jamal, A., Kumar, D., Helmi, R. A. A., & Fong, S. L. (2019). Portable Tor Router with Raspberry Pi. Proceedings of the 2019 8th International Conference on Software and Computer Applications, 533–537.

Kadir, M. M. A., Osman, M. N., Othman, N. A., & Sedek, K. A. (2020). IoT based Car Parking Management System using IR Sensor. Journal of Computing Research and Innovation, 5(2), 75–84.

Kutukian, G. (2016). Raspberry PI 3 Home Network Monitoring Tool [Thesis, California State Polytechnic University, Pomona]. http://dspace.calstate.edu/handle/10211.3/179269

Lales, C., & Carranza, A. (2013). Using the Raspberry Pi to Establish a Virtual Private Network (VPN) Connection to a Home Network.

Osman, M. N., Zulrahim, M. S. A. M., & Maghribi, M. (2016). RaspyAir: Self-Monitoring System for Wireless Intrusion Detection using Raspberry Pi. Journal of Computing Research and Innovation, 1(1), 14–21.

Phobos. (2010, June 1). Plaintext Over Tor is Still Plaintext | Tor Blog. https://blog.torproject.org/plaintext-over-tor-still-plaintext

Sheik, F., & Xinrong, L. (2014). Wireless Sensor Network System Design Using Raspberry Pi and Arduino for Environmental Monitoring Applications. Procedia Computer Science, 34, 103–110.

Stokkink, Q., Treep, H., & Pouwelse, J. (2015). Performance Analysis of a Tor-like Onion Routing Implementation. ArXiv - Computer Science, abs/1507.00245, 1–6.

Sumanth, R., & Bhanu, K. N. (2020). Raspberry Pi Based Intrusion Detection System Using K-Means Clustering Algorithm. 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), 221–229.

Syverson, P. F., Goldschlag, D. M., & Reed, M. G. (1997). Anonymous Connections and Onion Routing. Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 44–54.

Syverson, P., Reed, M., & Goldschlag, D. (2000). Onion Routing Access Configurations. Proceedings DARPA Information Survivability Conference and Exposition. DISCEX’00, 1, 34–40.

Syverson, P., Tsudik, G., Reed, M., & Landwehr, C. (2001). Towards an Analysis of Onion Routing Security. In H. Federrath (Ed.), Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability Berkeley, CA, USA, July 25–26, 2000 Proceedings (pp. 96–114). Springer.

Thakur, D., Kumar, Y., & Vijendra, S. (2020). Smart Irrigation and Intrusions Detection in Agricultural Fields Using IoT. Procedia Computer Science, 167, 154–162.

Tiwari, S., Arora, D., & Singh, V. (2015). Implementation of Routing Protocol for Network and Data Security using Onion Routing with Salt Method. 5(7), 3.

Tripathi, S., & Kumar, R. (2018). Raspberry Pi as an Intrusion Detection System, a Honeypot and a Packet Analyzer. 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), 80–85.

Vitosinschi, A. (2016). Protecting Privacy using TOR. Turku University of Applied Sciences.

Younglove, R. (2000). Virtual Private Networks—How They Work. Computing & Control Engineering Journal, 11(6), 260–262.

Downloads

Published

2021-04-01

How to Cite

Osman, M. N., Sedek, K. A. ., Othman, N. A. ., Rosli, M. A. ., & Maghribi, M. . (2021). Enhancing Security and Privacy in Local Area Network (LAN) with TORVPN Using Raspberry Pi as Access Point: A Design and Implementation. Journal of Computing Research and Innovation, 6(2), 31–42. https://doi.org/10.24191/jcrinn.v6i2.190

Issue

Section

General Computing

Most read articles by the same author(s)

1 2 > >> 

Similar Articles

You may also start an advanced similarity search for this article.

Loading...